10.07.2015 Views

QLogic 8 Gb Intelligent Pass-thru Module for IBM BladeCenter ...

QLogic 8 Gb Intelligent Pass-thru Module for IBM BladeCenter ...

QLogic 8 Gb Intelligent Pass-thru Module for IBM BladeCenter ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

4 – Network and Fabric ConfigurationManaging IP SecuritySIP Security ConceptsIP Security provides encryption-based security <strong>for</strong> IP version 4 communicationsthrough the use of security policies and associations. The security policy databaseis the set of all security policies configured on the switch. A security policy definesthe following parameters:• Connection source and destination• Data traffic direction: inbound or outbound• Protocols <strong>for</strong> which to protect data traffic• Security protocols; Authentication Header (AH) or Encapsulating SecurityPayload (ESP)• Level of protection: IP Security, discard, or nonePolicies can define security <strong>for</strong> host-to-host, host-to-gateway, andgateway-to-gateway connections; one policy <strong>for</strong> each direction. For example, tosecure the connection between two hosts, you need two policies: one <strong>for</strong>outbound traffic from the source to the destination, and another <strong>for</strong> inbound trafficto the source from the destination. You can specify sources and destinations by IPaddresses or DNS host names. If a host name resolves to more than one IPaddress, the switch creates the necessary policies and associations. You canrecognize these dynamic policies and associations because their names beginwith DynamicSP_ and DynamicSA_ respectively.You can apply IP security to all communication between two systems, or to selectprotocols, such as ICMP, TCP, or UDP. Furthermore, instead of applying IPsecurity, you can choose to discard all inbound or outbound traffic, or allow alltraffic without encryption. Both the AH and ESP security protocols provide sourceauthentication, ensure data integrity, and protect against replay.A security association defines the encryption algorithm and encryption key toapply when called by a security policy. A security policy may call severalassociations at different times, but each association is related to only one policy.The security association database is the set of all security associations.IP Security configurations can be complex: it is possible to unintentionallyconfigure policies and associations that isolate a switch from all communication. Ifthis happens, you can disable IP Security by placing the switch in maintenancemode, and correct the problem through the serial port interface. Refer to the<strong>QLogic</strong> 8 <strong>Gb</strong> <strong>Intelligent</strong> <strong>Pass</strong>-<strong>thru</strong> <strong>Module</strong> and 20-Port 8 <strong>Gb</strong> SAN Switch <strong>Module</strong>s:Installation Guide <strong>for</strong> in<strong>for</strong>mation about using maintenance mode and connectingthrough the serial port.4-6 59245-01 A

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!